CFP last date
20 May 2024
Reseach Article

A survey of DDoS Service Attacks in Collaborative Intrusion Detection System

by J.Manikandan, S.Vijayaragavan, R.Madhavi
journal cover thumbnail
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 25
Year of Publication: 2010
Authors: J.Manikandan, S.Vijayaragavan, R.Madhavi
10.5120/458-762

J.Manikandan, S.Vijayaragavan, R.Madhavi . A survey of DDoS Service Attacks in Collaborative Intrusion Detection System. International Journal of Computer Applications. 1, 25 ( February 2010), 50-56. DOI=10.5120/458-762

@article{ 10.5120/458-762,
author = { J.Manikandan, S.Vijayaragavan, R.Madhavi },
title = { A survey of DDoS Service Attacks in Collaborative Intrusion Detection System },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 25 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 50-56 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number25/458-762/ },
doi = { 10.5120/458-762 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:48:34.520784+05:30
%A J.Manikandan
%A S.Vijayaragavan
%A R.Madhavi
%T A survey of DDoS Service Attacks in Collaborative Intrusion Detection System
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 25
%P 50-56
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A DDoS (Distributed Denial-of-Service) attack is a distributed large-scale attempt by malicious users to flood the victim network with an enormous number of packets. This exhausts the victim network of resources such as bandwidth, computing power, etc., the victim is unable to provide services to its legitimate clients and network performance is greatly deteriorated. There are many proposed methods in the literature which aim to alleviate this problem; such as hop-count filtering, rate-limiting and statistical filtering. However, most of these solutions are meant for the wired Internet and there is little research efforts on mechanisms against DDoS attacks in wireless networks such as MANETs, IDS and ICMP. In this paper, we study the vulnerability of MANETs to DDoS flooding attacks and provide an overview of the commonly used security mechanism against DDoS attacks in wireless networks. The defense schemes proposed are statistical filtering, detection of RTS/CTS packets, signal interference frequency and retransmission time and response stage with ECN marking mechanism.

References
  1. L. Zhou and Z. J. Haas, Securing Ad Hoc Networks, IEEE Network Magazine, Special Issue on Network Security, Vol. 13, No. 6, 1999.
  2. Y. Zhang and. W. Lee, Intrusion Detection in. Wireless Ad Hoc Networks, Proceedings of the 6th International Conference on Mobile Computing and Networking, Boston, Massachusetts, United States, 2000.
  3. V. Gupta, S. Krishnamurthy and M. Faloutsos, Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks, Proceedings of the Military Communications. Conference (MICOM 2002), California, Oct 2002.
  4. B. Bencsath and I. Vajda, Protection Against DDoS Attacks Based On Traffic Level Measurements, Y. Kim, W. Lau, M. Chuah and J. Chao, PacketScore: Statistical-based Overload Control against Distributed Denial-of-Service Attacks, Proceedings of the. 23rd Conference of the IEEE Communications Society (INFOCOM 2004), Hong Kong, Mar 7-11; 2004.
  5. Q. Li, E-C. Chang and M. C. Chan, On the Effectiveness of DDoS Attacks on Statistical Filtering,
  6. C. Patrikakis, M. Masikos and O. Zouraraki, Distributed Denial of Service Attacks, The Internet Protocol Journal, Vol. 7, No. 4, Dec 2004.
  7. J. Mirkovic and P. Reiher, A Taxonomy of DDoS Attack and DDoS Defense Mechanisms, ACM Sigcomm Computer Communications Review, Vol. 34, No. 2, Apr 2004.
  8. L. Bajaj, M. Tekai, R. Ahuja, K. Tang, R. Bagrodia and M. Gerla, GloMoSim: A Scalable Network Simulation Environment, UCLA Computer Science Department Technical Report 990027, 1999.
  9. C. E. Perkins, E. M. Belding-Royer and L Chakeres, Ad Hoc On Demand Distance Vector (AODV) Routing, IETF RFC 3561, Jul 2003.
  10. Z. J. Haas and M. R. Pearlman, Determining the Optimal Configuration for the Zone Routing Protocol, IEEE JSAC, Special Issue on Ad-Hoc Networks, Vol. 17, No. 8, Aug 1999.
  11. M. Jiang, J. Li and Y. C. Tay, Cluster Based Routing Protocol (CBRP), Internet Draft, draft¬ ietf-manet-cbrpspec-Ol.txt, Aug 1999.
Index Terms

Computer Science
Information Sciences

Keywords

DDos IDS MANETs wireless network attack system